Making Masking Security Proofs Concrete - Or How to Evaluate the Security of Any Leaking Device.
Alexandre DucSebastian FaustFrançois-Xavier StandaertPublished in: EUROCRYPT (1) (2015)
Keyphrases
- information security
- security requirements
- intrusion detection
- security issues
- access control
- security problems
- information assurance
- security management
- security level
- statistical databases
- network security
- encryption scheme
- neural network
- theorem proving
- security mechanisms
- security analysis
- data security
- computer networks
- cryptographic protocols
- information systems
- high security
- security vulnerabilities
- data sets